Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Postman API Security Testing Tutorial

According to a recent study by OWASP, 70% of all web applications are vulnerable to security risks. API security testing is one of the most effective ways to mitigate these risks. Postman is a popular tool for API security testing, with over 10 million users worldwide. In today's digital world, APIs are the backbone of most applications. As a result, they are also a prime target for hackers. This is why it's important to perform security testing on your APIs to ensure that they are not vulnerable to attack.

How we standardized error handling at Vanta

‍ I love working in monolithic repositories. It fosters collaboration, code reuse, and knowledge sharing—some of my favorite aspects of engineering culture here. ‍ However, without guardrails, complexity can grow unchecked, making it harder to reason about the system as a whole. In early 2024, it was clear that our error handling strategies had fallen victim to this, and it was impacting the quality of our product.

Cross-Border Data Compliance: Navigating Public Security Regulations in a Connected World

It is a significant benefit that the world is connected the way it is, with the potential for even greater interconnectivity. However, this has come at huge costs, too, considering the rise in the direct involvement of state actors engaged in cyber warfare. Against this background, nations have a more acute awareness of digital vulnerabilities, which has radiated into regulatory frameworks concerning cross-border data compliance.

7 Best ISO 27001 Compliance Tools in 2025

ISO 27001 compliance is a must for businesses that want to protect sensitive data and build trust with clients. Getting certified can seem daunting but there are many tools in 2025 that can simplify the process. These platforms help automate key compliance tasks, track progress in real-time and keep businesses on top of their security and auditing needs. Here are seven of the best tools for ISO 27001 compliance in 2025.

ISO 31000 vs. COSO ERM frameworks - Navigating the risk landscape

In an era where uncertainty is the norm, strong risk management isn’t just good practice – it’s a competitive advantage. For technology leaders steering organizations through complex challenges, two frameworks consistently rise to the top: ISO 31000 and the COSO Enterprise Risk Management (ERM) framework. Knowing how they differ – and where each shines – is key to building resilience and making smarter, strategy-aligned decisions.

IoT Compliance for Enterprises: What MSPs Need to Know About the Future

IoT compliance for enterprises is essential to avoid legal penalties and protect sensitive data. As IoT devices become more widespread, enterprises must adhere to various regulations to ensure security and privacy. This article delves into what IoT compliance entails, key regulations to know, and strategies to help your enterprise stay compliant. The Cyber Resilience Act, a key regulatory initiative introduced by the European Commission, aims at enhancing cybersecurity standards for IoT devices.

Choosing a trusted auditor: 5 key questions to ask your potential auditor

Choosing a trusted auditor is a critical step in your compliance journey. A thorough audit not only validates your security posture but also helps you build trust with your customers. The right auditor can provide valuable insights into your operations, identify potential risks, and suggest improvements to enhance your overall security framework. ‍ Vanta believes it's important to empower you with the knowledge you need to make informed decisions when selecting an auditor.

StateRAMP Fast Track: How to Speed Up Authorization

Governmental cybersecurity is largely focused on federal government agencies. When we talk about FedRAMP, CMMC, DFARS, and other security standards, it’s almost always with an eye toward the governmental agencies and departments that comprise the federal government and the contractors and suppliers that work with them. For private businesses and non-governmental partners, ISO 27001 provides a great security framework. What about the middle ground, though?